咨询与建议

限定检索结果

文献类型

  • 7,728 篇 会议
  • 5,049 篇 期刊文献
  • 82 册 图书

馆藏范围

  • 12,859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,211 篇 工学
    • 5,690 篇 计算机科学与技术...
    • 4,677 篇 软件工程
    • 1,725 篇 信息与通信工程
    • 1,480 篇 控制科学与工程
    • 1,042 篇 电气工程
    • 900 篇 生物工程
    • 746 篇 电子科学与技术(可...
    • 716 篇 机械工程
    • 647 篇 生物医学工程(可授...
    • 502 篇 光学工程
    • 379 篇 动力工程及工程热...
    • 378 篇 仪器科学与技术
    • 361 篇 化学工程与技术
    • 297 篇 安全科学与工程
    • 280 篇 网络空间安全
    • 279 篇 交通运输工程
  • 4,127 篇 理学
    • 2,275 篇 数学
    • 983 篇 生物学
    • 936 篇 物理学
    • 672 篇 统计学(可授理学、...
    • 550 篇 系统科学
    • 364 篇 化学
  • 2,305 篇 管理学
    • 1,416 篇 管理科学与工程(可...
    • 942 篇 图书情报与档案管...
    • 530 篇 工商管理
  • 683 篇 医学
    • 569 篇 临床医学
    • 472 篇 基础医学(可授医学...
    • 297 篇 药学(可授医学、理...
    • 250 篇 公共卫生与预防医...
  • 317 篇 法学
    • 259 篇 社会学
  • 197 篇 经济学
  • 161 篇 教育学
  • 137 篇 农学
  • 33 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 299 篇 deep learning
  • 297 篇 feature extracti...
  • 280 篇 educational inst...
  • 280 篇 computational mo...
  • 209 篇 training
  • 203 篇 optimization
  • 193 篇 semantics
  • 181 篇 machine learning
  • 161 篇 computer science
  • 160 篇 software enginee...
  • 160 篇 predictive model...
  • 156 篇 accuracy
  • 149 篇 neural networks
  • 148 篇 data mining
  • 141 篇 image segmentati...
  • 129 篇 internet of thin...
  • 121 篇 support vector m...
  • 113 篇 wireless sensor ...
  • 107 篇 visualization
  • 103 篇 reinforcement le...

机构

  • 1,278 篇 college of compu...
  • 237 篇 college of compu...
  • 173 篇 college of compu...
  • 119 篇 college of contr...
  • 111 篇 college of compu...
  • 108 篇 software college...
  • 108 篇 college of compu...
  • 107 篇 college of compu...
  • 86 篇 college of compu...
  • 81 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 college of compu...
  • 70 篇 state key labora...
  • 64 篇 shenzhen univers...
  • 62 篇 college of compu...
  • 61 篇 college of softw...
  • 59 篇 the college of c...
  • 57 篇 school of inform...
  • 56 篇 college of infor...
  • 52 篇 fujian provincia...

作者

  • 40 篇 chen zengqiang
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 niyato dusit
  • 33 篇 zhen ji
  • 33 篇 lin qiuzhen
  • 33 篇 zhong ming
  • 32 篇 victor c. m. leu...
  • 32 篇 zengqiang chen
  • 30 篇 zhou jie
  • 29 篇 kaishun wu
  • 26 篇 li xin
  • 25 篇 wang hui
  • 25 篇 liu yang
  • 25 篇 shen linlin
  • 24 篇 el-sayed m.el-ke...
  • 22 篇 wang jian
  • 22 篇 zuoyong li
  • 22 篇 yi wang
  • 22 篇 ismail leila

语言

  • 10,787 篇 英文
  • 1,834 篇 其他
  • 263 篇 中文
  • 18 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Control Engineering College of Software"
12859 条 记 录,以下是4561-4570 订阅
排序:
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zhenyong Liu, Mengxiang Sun, Mingyang Deng, Ruilong Cheng, Peng Niyato, Dusit Chow, Mo-Yuen Chen, Jiming The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550000 China The Department of Automatic Control and Systems Engineering University of Sheffield SheffieldS10 2TN United Kingdom The State Key Laboratory of Industrial Control Technology the College of Control Science and Engineering Zhejiang University Hangzhou310027 China The School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The UM SJTU Joint Institute Shanghai Jiao Tong University Shanghai200240 China
Machine learning (ML) sees an increasing prevalence of being used in the internet-of-things (IoT)-based smart grid. However, the trustworthiness of ML is a severe issue that must be addressed to accommodate the trend ... 详细信息
来源: 评论
Application of Artificial Intelligence Technology in Power System Stability Assessment
收藏 引用
Procedia computer Science 2023年 228卷 79-88页
作者: Siyu Xiang Cao zhen Jian Peng Linghao Zhang Zhengguo Pu State Grid Sichuan Electric Power Research Institute Chengdu Sichuan 610095 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611700China College of Computer Science Sichuan University Chengdu 610065 China Anhui Jiyuan Software Co. Ltd. Hefei 230088 China
In order to realize power system stability assessment, the author studies a deep Convolutional neural network algorithm for power system operation stability assessment. Combining short-term simulation with neural netw... 详细信息
来源: 评论
Hybrid security scheme for a colored image using DNA and chaotic map
Hybrid security scheme for a colored image using DNA and cha...
收藏 引用
International Conference on Mathematics, Actuarial Science, computer Science and Statistics (MACS)
作者: Tayyaba Ajaz Humaira Ashraf Ghadah Alwakid Dept. of computer science and software Engineering International Islamic University Islamabad Islamabad Pakistan Department of Computer Science College of computer and information sciences Jouf university Al-Jouf Saudia Arabia
this paper proposes a color image encryption algorithm based on DNA encoding in conjunction with a 1D logistic map and a high-dimensional chaotic map. The XOR function is used to combine low and high-dimensional chaot... 详细信息
来源: 评论
Local Learning Joint with the Adaptive Graph for Subspace Representation
Local Learning Joint with the Adaptive Graph for Subspace Re...
收藏 引用
International Conference on Intelligent System and Knowledge engineering, ISKE
作者: Yangbo Wang Can Gao Jie Zhou Zhihui Lai College of Computer Science and Software Engineering Shenzhen University Shenzhen Guangdong China
The technique of local learning that recognizes each sample by its predefined neighbors has been successfully applied in unsupervised learning fields. However, how to determine the proper neighbors of a sample is a ch... 详细信息
来源: 评论
ENHANCING NEURAL SPOKEN LANGUAGE RECOGNITION: AN EXPLORATION WITH MULTILINGUAL DATASETS
arXiv
收藏 引用
arXiv 2025年
作者: Anidjar, Or Haim Yozevitch, Roi Department of Computer Software & Engineering Ariel University Golan Heights 1 Ariel4077625 Israel Department of Electrical Engineering Ariel University Golan Heights 1 Ariel4077625 Israel Faculty of Computer Science College of Management Elie Wiesel 2 Rishon LeTsiyon7579806 Israel Ariel Cyber Innovation Center Ariel University Golan Heights 1 Ariel4077625 Israel
In this research, we advanced a spoken language recognition system, moving beyond traditional feature vector-based models. Our improvements focused on effectively capturing language characteristics over extended perio... 详细信息
来源: 评论
Current-Constrained Finite-Time control Scheme for Speed Regulation of PMSM Systems With Unmatched Disturbances
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 16877-16887页
作者: Huiming Wang Zhize Zhang Yingjie Luo Junxiao Wang Jiankun Sun Yunda Yan Xianlun Tang Chongqing Key Laboratory of Complex Systems and Autonomous Control Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China College of Information Engineering Zhejiang University of Technology Hangzhou China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China Wuhan China Department of Computer Science University College London London U.K.
The article investigates the speed regulation of permanent magnet synchronous motor (PMSM) systems. Existing control methods of the non-cascade structure suffer from the drawbacks of unsatisfactory anti-disturbance pe... 详细信息
来源: 评论
QoS Optimization via Computation Offloading in Metaverse Environment
QoS Optimization via Computation Offloading in Metaverse Env...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Zhiyuan Ge Pengcheng Zhang Huiying Jin Hai Dong Shunhui Ji Jiajia Li Qi Wang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computing Technologies RMIT University Melbourne Australia
The emergence of the metaverse signifies a paradigm shift in Internet technology, offering a comprehensive virtual social platform spanning various domains such as social interaction, gaming, healthcare, and tourism. ... 详细信息
来源: 评论
Deep learning based DeepFake video detection
Deep learning based DeepFake video detection
收藏 引用
Smart Computing and Application (ICSCA), International Conference on
作者: Sarra Guefrachi Marwa Ben Jabra Naif A. Alsharabi Mohamed Tahar Ben Othman Yasser O. Alharabi Abdulsalam Alkholidi Habib Hammam Faculty of Engineering Université de Moncton) Moncton NB Canada Spectrum of Knowledge Production & Skills Development Sfax Tunisia Computer Engineering University of Ha'il Computer Science Amran University Yemen Ha'il KSA Department of Computer Science College of Computer) Qassim University Buraydah Saudi Arabia line Computer Science and Information College of computer sc. & engneering Ha'il University Ha'il KSA College Department of Software Engineering Canadian Institute of Technology Tirana Canada International Institute of Technology and Management Commune d'Akanda Libreville BP Ga-bon Dept of Electrical and Electronic Eng. Science School of Electrical Engineering University of Johannes-burg Tirana Canada
Recent advances in DeepFake face-swapping technology have made it simple to create fake videos that appear remarkably real. Since it has been employed in numerous instances for deceit, extortion, and the falsification... 详细信息
来源: 评论
RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Application
RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Appli...
收藏 引用
International Conference on Electronics, computers and Artificial Intelligence (ECAI)
作者: Ridha Ghayoula Wided Amara Amor Smida Jaouhar Fattahi Mohamed I. Waly Sahbi Bahroun Issam El Gmati Faculty of Engineering University of Moncton New Brunswick Canada SysCom Laboratory ENIT University of Tunis El Manar Tunis Tunisia College of Applied Medical Sciences Majmaah University Majmaah KSA Department of Computer Science && Software Engineering Laval University Quebec Canada Institut Superieur d’Informatique University of Tunis El Manar Tunis Tunisia College of Engineering Umm Al Qura University Umm Al Qura KSA
In the domain of medical imaging, ensuring the security of confidential patient data stands as a paramount concern. The imperative for robust encryption to safeguard medical images against unauthorized access has driv... 详细信息
来源: 评论
A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario : Extended Abstract
A Self-play and Sentiment-Emphasized Comment Integration Fra...
收藏 引用
International Conference on Data engineering
作者: Huan Rong Victor S. Sheng Tinghuai Ma Yang Zhou Mznah Al-Rodhaan School of Artificial Intelligence Nanjing University of Information Science & Technology Nanjing China Department of Computer Science Texas Tech University Lubbock USA School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Department of Computer Science & Software Engineering Auburn University Auburn USA College of Computer & Information Sciences King Saud University Riyadh Kingdom of Saudi Arabia
Crowdsourcing is a sourcing model where individuals or organizations obtain goods and services from a large, relatively open and often rapidly evolving group of internet users. The most common way that crowdsourcing c...
来源: 评论